Action not permitted
Modal body text goes here.
Modal Title
Modal Body
cve-2024-53102
Vulnerability from cvelistv5
This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.
Show details on NVD website{ "containers": { "cna": { "providerMetadata": { "dateUpdated": "2024-12-12T15:20:41.007Z", "orgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "shortName": "Linux" }, "rejectedReasons": [ { "lang": "en", "value": "This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ] } }, "cveMetadata": { "assignerOrgId": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "assignerShortName": "Linux", "cveId": "CVE-2024-53102", "datePublished": "2024-11-25T21:21:29.297Z", "dateRejected": "2024-12-12T15:20:41.007Z", "dateReserved": "2024-11-19T17:17:24.984Z", "dateUpdated": "2024-12-12T15:20:41.007Z", "state": "REJECTED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2024-53102\",\"sourceIdentifier\":\"416baaa9-dc9f-4396-8d5f-8c081fb06d67\",\"published\":\"2024-11-25T22:15:17.553\",\"lastModified\":\"2024-12-12T16:15:54.967\",\"vulnStatus\":\"Rejected\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority.\"}],\"metrics\":{},\"references\":[]}}" } }
WID-SEC-W-2024-3547
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3547 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3547.json" }, { "category": "self", "summary": "WID-SEC-2024-3547 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3547" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53097", "url": "https://lore.kernel.org/linux-cve-announce/2024112505-CVE-2024-53097-cd93@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53096", "url": "https://lore.kernel.org/linux-cve-announce/2024112506-CVE-2024-53096-5bcc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53098", "url": "https://lore.kernel.org/linux-cve-announce/2024112506-CVE-2024-53098-2135@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53099", "url": "https://lore.kernel.org/linux-cve-announce/2024112506-CVE-2024-53099-e454@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53100", "url": "https://lore.kernel.org/linux-cve-announce/2024112506-CVE-2024-53100-0d0d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53101", "url": "https://lore.kernel.org/linux-cve-announce/2024112506-CVE-2024-53101-203a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53102", "url": "https://lore.kernel.org/linux-cve-announce/2024112507-CVE-2024-53102-a45c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50228", "url": "https://lore.kernel.org/linux-cve-announce/2024112552-wish-oboe-1b91@gregkh/#t" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", "url": "https://linux.oracle.com/errata/ELSA-2024-12887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20018 vom 2025-01-13", "url": "https://linux.oracle.com/errata/ELSA-2025-20018.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff", "tracking": { "current_release_date": "2025-01-19T23:00:00.000+00:00", "generator": { "date": "2025-01-20T09:18:46.298+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3547", "initial_release_date": "2024-11-25T23:00:00.000+00:00", "revision_history": [ { "date": "2024-11-25T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-01-15T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-19T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T008144", "product_identification_helper": { "cpe": "cpe:/a:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-50228", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-50228" }, { "cve": "CVE-2024-53096", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53096" }, { "cve": "CVE-2024-53097", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53097" }, { "cve": "CVE-2024-53098", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53098" }, { "cve": "CVE-2024-53099", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53099" }, { "cve": "CVE-2024-53100", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53100" }, { "cve": "CVE-2024-53101", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53101" }, { "cve": "CVE-2024-53102", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53102" } ] }
wid-sec-w-2024-3547
Vulnerability from csaf_certbund
Notes
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Der Kernel stellt den Kern des Linux Betriebssystems dar.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein lokaler Angreifer kann mehrere Schwachstellen in Linux Kernel ausnutzen, um einen nicht n\u00e4her spezifizierten Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- Linux", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3547 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3547.json" }, { "category": "self", "summary": "WID-SEC-2024-3547 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3547" }, { "category": "external", "summary": "Kernel CVE Announce Mailingliste", "url": "https://lore.kernel.org/linux-cve-announce/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53097", "url": "https://lore.kernel.org/linux-cve-announce/2024112505-CVE-2024-53097-cd93@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53096", "url": "https://lore.kernel.org/linux-cve-announce/2024112506-CVE-2024-53096-5bcc@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53098", "url": "https://lore.kernel.org/linux-cve-announce/2024112506-CVE-2024-53098-2135@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53099", "url": "https://lore.kernel.org/linux-cve-announce/2024112506-CVE-2024-53099-e454@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53100", "url": "https://lore.kernel.org/linux-cve-announce/2024112506-CVE-2024-53100-0d0d@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53101", "url": "https://lore.kernel.org/linux-cve-announce/2024112506-CVE-2024-53101-203a@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-53102", "url": "https://lore.kernel.org/linux-cve-announce/2024112507-CVE-2024-53102-a45c@gregkh/" }, { "category": "external", "summary": "Linux Kernel CVE Announcement CVE-2024-50228", "url": "https://lore.kernel.org/linux-cve-announce/2024112552-wish-oboe-1b91@gregkh/#t" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4314-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/SARXL66CQHD5VSFG5PUBNBVBPVFUN4KT/" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4318-1 vom 2024-12-13", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019999.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4316-1 vom 2024-12-13", "url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/S4I5Z6ALCJLHTP25U3HMJHEXN4DR2USM/" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12884 vom 2024-12-17", "url": "https://linux.oracle.com/errata/ELSA-2024-12884.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2024-12887 vom 2024-12-18", "url": "https://linux.oracle.com/errata/ELSA-2024-12887.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2024:4387-1 vom 2024-12-19", "url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/020032.html" }, { "category": "external", "summary": "Debian Security Advisory DLA-4008 vom 2025-01-03", "url": "https://lists.debian.org/debian-lts-announce/2025/01/msg00001.html" }, { "category": "external", "summary": "Oracle Linux Security Advisory ELSA-2025-20018 vom 2025-01-13", "url": "https://linux.oracle.com/errata/ELSA-2025-20018.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0117-1 vom 2025-01-15", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020131.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0154-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020151.html" }, { "category": "external", "summary": "SUSE Security Update SUSE-SU-2025:0153-1 vom 2025-01-17", "url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020150.html" } ], "source_lang": "en-US", "title": "Linux Kernel: Mehrere Schwachstellen erm\u00f6glichen nicht spezifizierten Angriff", "tracking": { "current_release_date": "2025-01-19T23:00:00.000+00:00", "generator": { "date": "2025-01-20T09:18:46.298+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3547", "initial_release_date": "2024-11-25T23:00:00.000+00:00", "revision_history": [ { "date": "2024-11-25T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" }, { "date": "2024-12-15T23:00:00.000+00:00", "number": "2", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2024-12-16T23:00:00.000+00:00", "number": "3", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-18T23:00:00.000+00:00", "number": "4", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2024-12-19T23:00:00.000+00:00", "number": "5", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-02T23:00:00.000+00:00", "number": "6", "summary": "Neue Updates von Debian aufgenommen" }, { "date": "2025-01-12T23:00:00.000+00:00", "number": "7", "summary": "Neue Updates von Oracle Linux aufgenommen" }, { "date": "2025-01-15T23:00:00.000+00:00", "number": "8", "summary": "Neue Updates von SUSE aufgenommen" }, { "date": "2025-01-19T23:00:00.000+00:00", "number": "9", "summary": "Neue Updates von SUSE aufgenommen" } ], "status": "final", "version": "9" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Debian Linux", "product": { "name": "Debian Linux", "product_id": "2951", "product_identification_helper": { "cpe": "cpe:/o:debian:debian_linux:-" } } } ], "category": "vendor", "name": "Debian" }, { "branches": [ { "category": "product_name", "name": "Open Source Linux Kernel", "product": { "name": "Open Source Linux Kernel", "product_id": "T008144", "product_identification_helper": { "cpe": "cpe:/a:linux:linux_kernel:-" } } } ], "category": "vendor", "name": "Open Source" }, { "branches": [ { "category": "product_name", "name": "Oracle Linux", "product": { "name": "Oracle Linux", "product_id": "T004914", "product_identification_helper": { "cpe": "cpe:/o:oracle:linux:-" } } } ], "category": "vendor", "name": "Oracle" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux", "product": { "name": "SUSE Linux", "product_id": "T002207", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_linux:-" } } } ], "category": "vendor", "name": "SUSE" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-50228", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-50228" }, { "cve": "CVE-2024-53096", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53096" }, { "cve": "CVE-2024-53097", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53097" }, { "cve": "CVE-2024-53098", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53098" }, { "cve": "CVE-2024-53099", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53099" }, { "cve": "CVE-2024-53100", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53100" }, { "cve": "CVE-2024-53101", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53101" }, { "cve": "CVE-2024-53102", "notes": [ { "category": "description", "text": "Im Linux-Kernel bestehen mehrere Schwachstellen, die auf verschiedene Speicherverwaltungs- und andere Implementierungsfehler zur\u00fcckzuf\u00fchren sind. Komponenten wie bpf, nvme und andere sind davon betroffen. Ein Angreifer kann diese Schwachstellen ausnutzen, um einen Denial-of-Service-Zustand oder andere nicht spezifizierte Effekte zu verursachen." } ], "product_status": { "known_affected": [ "2951", "T002207", "T004914", "T008144" ] }, "release_date": "2024-11-25T23:00:00.000+00:00", "title": "CVE-2024-53102" } ] }
fkie_cve-2024-53102
Vulnerability from fkie_nvd
▼ | URL | Tags |
---|
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "Rejected reason: This CVE ID has been rejected or withdrawn by its CVE Numbering Authority." } ], "id": "CVE-2024-53102", "lastModified": "2024-12-12T16:15:54.967", "metrics": {}, "published": "2024-11-25T22:15:17.553", "references": [], "sourceIdentifier": "416baaa9-dc9f-4396-8d5f-8c081fb06d67", "vulnStatus": "Rejected" }
ghsa-59xx-49pj-8gx8
Vulnerability from github
In the Linux kernel, the following vulnerability has been resolved:
nvme: make keep-alive synchronous operation
The nvme keep-alive operation, which executes at a periodic interval, could potentially sneak in while shutting down a fabric controller. This may lead to a race between the fabric controller admin queue destroy code path (invoked while shutting down controller) and hw/hctx queue dispatcher called from the nvme keep-alive async request queuing operation. This race could lead to the kernel crash shown below:
Call Trace: autoremove_wake_function+0x0/0xbc (unreliable) __blk_mq_sched_dispatch_requests+0x114/0x24c blk_mq_sched_dispatch_requests+0x44/0x84 blk_mq_run_hw_queue+0x140/0x220 nvme_keep_alive_work+0xc8/0x19c [nvme_core] process_one_work+0x200/0x4e0 worker_thread+0x340/0x504 kthread+0x138/0x140 start_kernel_thread+0x14/0x18
While shutting down fabric controller, if nvme keep-alive request sneaks in then it would be flushed off. The nvme_keep_alive_end_io function is then invoked to handle the end of the keep-alive operation which decrements the admin->q_usage_counter and assuming this is the last/only request in the admin queue then the admin->q_usage_counter becomes zero. If that happens then blk-mq destroy queue operation (blk_mq_destroy_ queue()) which could be potentially running simultaneously on another cpu (as this is the controller shutdown code path) would forward progress and deletes the admin queue. So, now from this point onward we are not supposed to access the admin queue resources. However the issue here's that the nvme keep-alive thread running hw/hctx queue dispatch operation hasn't yet finished its work and so it could still potentially access the admin queue resource while the admin queue had been already deleted and that causes the above crash.
This fix helps avoid the observed crash by implementing keep-alive as a synchronous operation so that we decrement admin->q_usage_counter only after keep-alive command finished its execution and returns the command status back up to its caller (blk_execute_rq()). This would ensure that fabric shutdown code path doesn't destroy the fabric admin queue until keep-alive request finished execution and also keep-alive thread is not running hw/hctx queue dispatch operation.
{ "affected": [], "aliases": [ "CVE-2024-53102" ], "database_specific": { "cwe_ids": [], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2024-11-25T22:15:17Z", "severity": null }, "details": "In the Linux kernel, the following vulnerability has been resolved:\n\nnvme: make keep-alive synchronous operation\n\nThe nvme keep-alive operation, which executes at a periodic interval,\ncould potentially sneak in while shutting down a fabric controller.\nThis may lead to a race between the fabric controller admin queue\ndestroy code path (invoked while shutting down controller) and hw/hctx\nqueue dispatcher called from the nvme keep-alive async request queuing\noperation. This race could lead to the kernel crash shown below:\n\nCall Trace:\n autoremove_wake_function+0x0/0xbc (unreliable)\n __blk_mq_sched_dispatch_requests+0x114/0x24c\n blk_mq_sched_dispatch_requests+0x44/0x84\n blk_mq_run_hw_queue+0x140/0x220\n nvme_keep_alive_work+0xc8/0x19c [nvme_core]\n process_one_work+0x200/0x4e0\n worker_thread+0x340/0x504\n kthread+0x138/0x140\n start_kernel_thread+0x14/0x18\n\nWhile shutting down fabric controller, if nvme keep-alive request sneaks\nin then it would be flushed off. The nvme_keep_alive_end_io function is\nthen invoked to handle the end of the keep-alive operation which\ndecrements the admin-\u003eq_usage_counter and assuming this is the last/only\nrequest in the admin queue then the admin-\u003eq_usage_counter becomes zero.\nIf that happens then blk-mq destroy queue operation (blk_mq_destroy_\nqueue()) which could be potentially running simultaneously on another\ncpu (as this is the controller shutdown code path) would forward\nprogress and deletes the admin queue. So, now from this point onward\nwe are not supposed to access the admin queue resources. However the\nissue here\u0027s that the nvme keep-alive thread running hw/hctx queue\ndispatch operation hasn\u0027t yet finished its work and so it could still\npotentially access the admin queue resource while the admin queue had\nbeen already deleted and that causes the above crash.\n\nThis fix helps avoid the observed crash by implementing keep-alive as a\nsynchronous operation so that we decrement admin-\u003eq_usage_counter only\nafter keep-alive command finished its execution and returns the command\nstatus back up to its caller (blk_execute_rq()). This would ensure that\nfabric shutdown code path doesn\u0027t destroy the fabric admin queue until\nkeep-alive request finished execution and also keep-alive thread is not\nrunning hw/hctx queue dispatch operation.", "id": "GHSA-59xx-49pj-8gx8", "modified": "2024-11-26T00:33:31Z", "published": "2024-11-26T00:33:31Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2024-53102" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/1a1bcca5c9efd2c72c8d2fcbadf2d673cceb2ea7" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/afa229465399f89d3af9d72ced865144c9748846" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/ccc1d82dfaad0ad27d21139da22e57add73d2a5e" }, { "type": "WEB", "url": "https://git.kernel.org/stable/c/d06923670b5a5f609603d4a9fee4dec02d38de9c" } ], "schema_version": "1.4.0", "severity": [] }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.